Stuxnet: An important change in the national security landscape

Siemens provides the SIMATIC PCS 7 with “everything you need to completely and safely automate your entire production process.” There are some important strategic changes occurring in the national security landscape. A new kind of cyber attack has been noted, one that involves use of malicious code to attack infrastructure.  There are some important points in this […]

Defending Against Stuxnet Type Threats

The following article by renowned security capability developer Dr. Anup Ghosh was was originally posted at the Invincea blog and is reposted here with the author’s permission. ============= Question: what is the most significant cyber event of 2010? Answer: Stuxnet. While security analysts continue to marvel over Stuxnet’s capabilities, one disturbing aspect to Stuxnet is current defenses […]

Some Thoughts on the Iranian Cyber Army and what they mean to Cyber

Projections this week state that the Iranian Cyber Army has a botnet of over 400k machines.  They apparently plan to offer rental of these “assets” to interested parties. The ICA maintains that this is not “retribution” for the Stuxnet attacks on Irani Nuclear facilities, but rather a money making opportunity. One of the discussions/debates featured […]

Cyberwar? What Cyberwar?

Ladies and Gentlemen, put down the keyboards, stop reading the screen for a moment, and take a deep breath. I’ll wait. Ok. Now that you’ve done that, you can relax with the knowledge that we are not currently — nor have we ever been in — a “cyberwar” with any foreign power or group. Yes, […]

Enterprise Technology Developments in 2010 and 2011

Happy New Year!  Best wishes for your 2011. From a CTO perspective 2010 has been an incredibly busy year, and odds are the pace will only accelerate. We began 2010 with the nation still dealing with the Christmas Day 2009  terror attack, which was a reminder that conniving enemies still seek ways to attack and […]

Cyberattack as Covert Action

Most of what we see in day-to-day cybersecurity is not cyberwar, or the perennial threat of the ‘digital Pearl Harbor.’  Crime, espionage, political vandalism, and military “long-range cyber-reconaissance”–rather than kinetic targeting that kills, damages, or disables–are more mundane, day-to-day concerns. National Defense University’s Samuel Liles does make a persuasive case that much of cyberwar exists mainly on […]